1A Workflow Fragmentation Framework for Enterprise Grid Workflow Systems
- 格式:pdf
- 大小:584.55 KB
- 文档页数:6
fragement详解Fragment(片段)是编程中的一个概念,指的是在Android开发中可以独立存在的模块化组件。
相较于Activity(活动),Fragment有更好的灵活性、可重用性和扩展性。
本文将详细解释Fragment的定义、使用方法、生命周期、与Activity的关系等内容,以帮助读者深入了解Fragment的优点和实践。
第一部分:Fragment定义和使用方法一、Fragment定义Fragment是Android提供的一种用户界面组件,可以嵌入到Activity中进行布局和交互。
每个Fragment都有自己的生命周期,可以独立接收用户输入、响应事件、更新UI等。
Fragment可以看作是一种轻量级的Activity,但与Activity不同的是,Fragment必须依附于一个Activity才能使用。
二、Fragment使用方法要在项目中使用Fragment,首先需要确保你的项目使用了适当的版本和依赖库。
在Android Studio中,可以在build.gradle 文件中添加以下代码来引入Fragment支持:```implementation 'androidx.fragment:fragment:1.3.0'```然后,在XML布局文件中定义Fragment的容器。
在Activity 中可以添加一个`<FrameLayout>`元素作为容器,如下所示:```<FrameLayoutandroid:id="@+id/fragment_container"android:layout_width="match_parent"android:layout_height="match_parent" />```接着,在Activity中实例化一个Fragment对象,并将其添加到容器中。
The PatientSafe Mobile MaturityModel for Healthcare®A FRAMEWORK FOR CLINICAL MOBILITY ASSESSMENT AND PLANNINGIntroductionOver the past six years, healthcare has seen a dramatic increase in the volumeof mobile and smartphone devices inuse in hospitals by staff and patients alike. The sweeping transition to and adoption of these devices gives rise toa high impact trend shaping the mobile-enabled transformation of the healthcare enterprise: The emergence of Clinical Communication & Collaboration (CC&C) as an indispensable product category for the modern health system1.As health systems start to look beyond their EHRs for further value at thepoint-of-care to improve quality and productivity, CC&C solutions offer an intuitive path, leveraging the power of mobile experiences to help care teams achieve better outcomes while improving the experience of care. With the aid of smartphone-enabled applications, we can now seamlessly connect the extended care team across inpatient and outpatient settings on a real-time basis. This level of connectivity can deliver significant value such as improving the timeliness of care, and patient, care team and clinical context consistency across hand-offs.However, successful adoption and useof mobile technologies in the healthcare industry still faces significant challenges. Fragmentation continues to be the norm across infrastructure, devices, integration points, applications, and clinical workflows. In fact, frontline users of mobile devices and applications are already experiencing an increase in workflow fragmentation. A recent HIMSS Analytics study noted that the average clinician has to navigate at least five different devices and application modalities in order to communicate and collaborate with the rest of the care team throughout their shift2.High levels of fragmentation and the general lack of a comprehensive mobility strategy hinders the industry’s progress toward sustainable mobility investments and ushering the clinical communication and collaboration category forward. As health system IT and clinical organizations respond to the rapidly evolving trendsin both CC&C and app-enabled patient engagement, we are observing the need for a clear framework for assessing an organization’s mobile maturity. This framework can inform a cohesive clinical communication and collaboration strategy that aligns the appropriate people, processes, and technologies to deliver an optimized mobile experience for staff and patients alike. Therefore, we are proposing this inaugural version of the PatientSafe Mobile Maturity Model for Healthcare®to help our colleagues and customers organize strategic and operational planning for a successful mobility journey.The Natural Evolution of Mobile AdoptionLike many technologies, mobility adoption in healthcare has followed three successive phases: Phase I:A d hoc reaction to individual painpoints via point solutionsPhase 2:C ollective awareness of thefragmentation consequences of thesepoint solutions and migration towardsintegrated platformsPhase 3:C larity on the need for an integratedstrategy, supported by repeatableprocesses and the ability to monitor andmanage towards intended outcomes.In the past five years, mobile adoption has predominantly been in the ad hoc reaction phase in which our industry has seen the rapid rise of and resulting tremendous fragmentation caused by single purpose apps that clutter mobile device user’s home screens and create further context switching tax as users must navigate multiple apps to carry out their workflows. In the past two years, we have seen the industry begin a concerted effortto seek a true platform approach to mobility solutions. Thought leaders in our space are shifting to clinical communication platforms that encompass more than simple secured messaging, and advance toward integrated voice, alerts, and most importantly, true EMR integrated workflows via a single unified app that can deliver a fundamentally streamlined user experience.Although there are pockets of excellenceand promise, as a whole, our industry isstill far from repeatable processes and true predictable outcomes management ofmobile technologies. The PatientSafe Mobile Maturity Model for Healthcare® should serve as a navigation framework and strategy map to help health systems achieve the highest level of mobile technology adoption success broadly, but especially in the context of clinical communication and collaboration investments.The Six Key Capabilities in the PatientSafe Mobile Maturity ModelThe PatientSafe Mobile Maturity Model for Healthcare reflects an organization’s focus and capabilities in each of six key categories. These six dimensions must be carefully assessed to fully understand an organization’s current state and path forward to optimal mobility adoption and performance. The significant inter-dependencies between these components must also be considered during both strategy development and program planning.1. Outcomes Management:Outcomes definition, monitoring, and ongoing optimization are key criteria for a mature approach to mobility. In combination, all five preceding dimensions will set a foundation for better outcomes. However, it is only by defining the financial, operational and clinical performance desired from mobile technologies at the outset that health care organizations can achieve optimal return from their mobility program investments.Outcomes definition, monitoring, and improvement is the criteria to be considered in conjunction with workflow design. Without the right workflows, the right level of adoption, and the right integration points, no clear outcomes can be achieved with a mobile program. In a comprehensive mobility program, outcomes are measured by both clinical and IT performance.As health systems progress from ad hoc approaches to an integrated mobile platform strategy, all six capabilities must be considered and examined in terms of their interdependency.A successful mobility program is never ashort-term project. Rather, it is an ongoing, continuous pursuit to be guided by clear vision, comprehensive strategy, and a disciplined framework. Evaluating each of the six dimensions will be helpful for all organizations as they determine their short, medium, andlong-term mobility goals. Mobile transformation requires health systems to shift from ad-hoc solutions to strategic planning.2. Workflow Design:Workflow consideration includes the type of communication, documentation, coordination, and execution tasks across each user persona on the extended care team. Advanced organizations include patients & their families in care team planning. Organizations in the early stages of mobile maturity often put workflow as a late-stage consideration orin-production learning. Organizations in advanced stages of mobile maturity prefer to start with workflow design for cross-enterprise teams - more than just one group of users.3. Integration Planning:Integration planning encompasses the tools, mechanisms, protocols, and standards through which structured data from source systems are processed and routed to the various applications on the mobile device of choice. The degree to which integration is planned and managed vs. ad hoc and reactive increases as organizations advance upward through the stages of mobile maturity in our model.4. Application Selection:The sheer volume and variety of mobile applications available in the healthcare settingcan be overwhelming. An organization’s mobile maturity also depends on the degree to which consideration of end user experience influences application selection - inadvertent degradation and accidental fragmentation vs. careful considerations of streamlined, enhanced workflows.5. Mobile Device Management:An organization’s maturity in the selection of mobile devices evolves as they progress from ad hoc adoption to a more planful platform strategy. Mobile device choice is a key consideration driving mobile adoption, and includes smartphone hardware manufacturer (Apple, Samsung, Zebra, etc.), OS developer, and versions(e.g. iOS 12.x, Android Jellybean, TC51 16.04).6. Infrastructure Management:Through the lens of mobile adoption, infrastructure considerations include wireless networks, telephony systems, data center and hosting environments, security standards, and enterprise database infrastructure. The expertise, process sophistication, and key technology requirements increase as new use cases are brought into the mobile-enabled ecosystem.The 5 Stages of Mobile Maturity Organizations generally progress from a fragmented, reactive approach to a moremanaged and scalable mobility program. Along this progression, they discover what the people, process, and technology requirements are in each of the six aforementioned capabilities. The following provides a short description and key characteristics of each stage in the PatientSafe Mobile Maturity Model progressing upward from immature Stage 0 to full maturity in Stage 4.Depending on the scale and evolution of an organization, it may simultaneously be in multiple stages of maturity due to historical investment or the nature of organizational decision making (centralized vs. distributed/localized). It is important to recognize that a detailed assessment of each of the six capabilities will determine the optimal transition path to higher stages of maturity in this model. Regardless of where anorganization is today across each of the six capabilities, implementing the best practices demonstrated in Stage 4 will facilitate a more rapid evolution to mobile maturity and desired outcomes. The fundamental paradigm shift to an outcomes-focused mobility strategy will help healthcare organizations overcome the challenges of the past, and chart a path to tangible results – improving quality, safety, productivity, and satisfaction.Develop a Mobility Program Charter — A common frame for organizing people, processes and technologies.The Five Stages of MaturityWhat you may find in organizations operating at this stageThe design and implementation approach to mobility remains reactive in organizations at Stage 0. Typical status across all six capabilities may look similar to the following.Infrastructure Management• 3 or more PBX systems• 2 or more Wi-Fi network standards• 2.5 Ghz network• W i-Fi security standards refresh was conducted more than three years ago• L ast Wi-Fi coverage assessment was conducted more than 2 years agoMobile Device Management• 3 or more types of mobile devices in use by the care team• Pagers are still used in high volume• L egacy VoIP handsets are the standard communications device of choice• W orkstations on wheels are used for clinical documentation• B YOD smartphone deployment is conducted without Mobile Device Management (MDM) strategy or support• Mobile device security risks and exposure exist Integration Planning• Integration is ad hoc• N o integration of patient, care team or clinical context in smartphone apps• A lerts are not consistently available on all mobile devicesApplication Selection• L ack of or limited use of smartphone apps for care team collaboration and clinical documentationWorkflow Design• N o consideration of workflow designor integration in mobile device and application selection• U sers generally dissatisfied aboutmobile technology’s ability to helpthem execute workflowsOutcomes Management• N o consideration of measurable financial, operational, or clinical outcome targets for mobile technology investmentsWhat you may find in organizations operating at this stageThe organization’s approach to mobility remains “bottoms-up” with an IT bias towards technical infrastructure and devices. There is minimal clinical input on workflow design and user experience.Infrastructure Management• PBX consolidation planned or in-progress• Both 2.5Ghz and 5Ghz Wi-Fi networks in place • S upporting across K/V/R, with latest security standards• W i-Fi coverage map has been re-assessed within the last yearMobile Device Management• T here is a concerted IT-led initiative underway to consolidate device footprint• T he organization is seeking a single smartphone device for their shared device strategy Integration Planning• Integration is ad hoc• N o integration of patient, care team or clinical context in smartphone apps• A lerts are not consistently available on all mobile devices Application Selection• O nce device selection is final, mindset is “We can support any and all apps.”• N o serious forethought about how application strategy impacts device strategy and vice versaWorkflow Design• N o consideration of workflow designor integration in mobile device and application selection• U sers are excited about the upcoming smartphone initiative, but thorough workflow design remains elusive Outcomes Management• N o consideration of measurable financial, operational, or clinical outcome targets for mobile technology investmentsWhat you may find in organizations operating at this stageThe organization’s design and implementation approach to mobility remains “bottoms-up” with IT bias towards technical infrastructure and little clinical input on workflow design and user experience.Infrastructure Management• PBX consolidation planned or in-progress • Both 2.5Ghz and 5Ghz Wi-Fi networks in place • S upporting across K/V/R, with latest security standards• W i-Fi coverage map has been re-assessed within the last yearMobile Device Management• Device consolidation efforts are complete • Beginning broader use of smartphone devices Integration Planning• S ome integration of alerts and notifications to smartphones• S till challenges by a high volume of alerts and alert fatigue Application Selection• P roliferation of single purpose apps— the “app tool belt”• M ultiple users have access to mobile apps, but data and context exchange between apps isn’t consideredWorkflow Design• A pplication proliferation results in workflow fragmentation and unintended consequences at point of care• User experience friction increases• U ser desire for workflow integration andre-design increasesOutcomes Management• N o consideration of measurable financial, operational, or clinical outcomes targetsfor mobile technology investmentsWhat you may find in organizations operating at this stageInfrastructure Management• O n-going optimization of infrastructure to reflect design criteria• A dditional support processes determined through workflow and outcomes discussions Mobile Device Management• Device consolidation efforts are complete • T he organization’s device choice is determined and optimized through clear definition of both workflow and application use cases Integration Planning• I ntentional, planned data flow from source systems and monitors to mobile apps on smartphones.• I ntegration data flow is mapped carefully• Defined workflow and application use cases Application Selection• C onsolidation of disparate applications has eliminated the app tool belt.• B road movement toward a one- or two-app platform approach that can satisfy both communications and workflow needs Workflow Design• C ross-functional workflow needs between providers, clinicians, allied health team, ancillary staff, and patient/family are mapped out and understood• W orkflow mapping is used to examineand drive application, device, and infrastructure decisionsOutcomes Management• S ome discussion of outcomes and how they maps to workflow (and vice versa) take place • U nable to achieve consistent results due to earlier decisions made about infrastructure, devices, and integration that now need to be untangledWhat you may find in organizations operating at this stageInfrastructure Management• O ptimized voice, network, and clinical applications infrastructure that supports a large volume of mobile interactions• C onnectivity characterized by high availability, great roaming characteristics, little to no latency Mobile Device Management• T he right device chosen and deployed for the right setting: shared devices for inpatient, BYOD for physician and ambulatory Integration Planning• O ptimized and consolidatedintegration strategy• W orkflow-to-data flow mapped across the enterprise vs. siloed and departmental Application Selection• C onsolidation of disparate applications has eliminated the app tool belt• B road movement toward a one- or two-app platform approach that can satisfy both communications and workflow needs Workflow• C ross-functional workflow needs between providers, clinicians, allied health team, ancillary staff, and patient/family are mapped out and understood• W orkflow mapping is used to examineand drive application, device, and infrastructure decisionsOutcomes Management• D esired outcomes metrics attributable to mobile initiatives are well defined• Results are monitored on a continuous basis • P redictable and consistent achievement of outcomes has been establishedConclusion — Future Evolution of the PatientSafe Mobile Maturity ModelThe rise of mobile technologies and applications brings an unprecedented opportunity to the healthcare landscape for providers, clinicians, and patients to engage in new care experiences that can be significantly simpler and more effective than those of the past. This trend enables health systems to significantly improve the efficiency and productivity of point-of-care workflows and coordination across the care team. Research organizations such as Gartner have long seen the promise of Real-Time Healthcare Systems — in which context, data, and actions come together ina real-time, dynamic fashion, centered around the patient’s needs to help deliver high quality and effective care. Gartner also sees that mobile investments and their complementary technologies can create new channels to collaborate on care that are vital to coordinate transitions of care within today’s complex, often disjointed, care delivery system3.T o build the real-time healthcare system of the future, healthcare organizations are beginning to invest more deeply and strategically in mobile technologies. As such, we believe the industry needs to collaborate on a strategic framework to help health system leadership consider and plan mobility investments with greater purpose, clarity, and structure.This first version of the PatientSafe Mobile Maturity Model for Healthcare® seeks to create a referenceable that enables assessment of any institution’s current state of mobile investmentand organizational capability. Most importantly, it should help structure and define a mobility vision and strategy that guides the creation of a clear and cogent roadmap for decision making across infrastructure, device planning, integrations, application selection, and workflow design, toward complete outcomes management. This paper serves as the inaugural edition of the PatientSafe Mobile Maturity Model for Healthcare. We invite collaboration from healthcare research organizations, health systems, and vendors to further refine and evolve the Model.References1. Gartner 2018 Market Guide for Clinical Communication and Collaboration2. The State of Clinical Communication and Workflow: A HIMSS Analytics Benchmark Survey3. Gartner 2018 Strategic Roadmap to the Real-Time Health System。
workflow源码解析Workflow是一种用于描述和执行工作流程的编程模型,它可以帮助我们更好地组织和管理复杂的业务流程。
本文将对Workflow的源码进行解析,分析其实现原理和核心功能。
Workflow的源码主要包括工作流引擎、工作流定义和工作流实例三个部分。
工作流引擎是整个系统的核心,它负责解析工作流定义,创建和管理工作流实例,并根据定义中的规则和条件来驱动工作流的执行。
工作流定义是工作流的静态描述,它由一组任务和它们之间的关系组成。
每个任务代表一个具体的操作,比如发送邮件、生成报告等。
任务之间的关系包括顺序、并行和条件等,用于定义任务的执行顺序和条件。
工作流实例是工作流的动态执行过程,它由一组任务实例和它们的执行状态组成。
任务实例代表工作流中的一个具体任务的执行过程,包括任务的执行状态、输入参数和输出结果等。
工作流实例根据工作流定义的规则和条件来驱动任务实例的执行,实现整个工作流的自动化执行。
Workflow的源码采用面向对象的设计思想,使用Java语言实现。
它使用了一些设计模式,如工厂模式、观察者模式和状态模式等,来实现工作流引擎的灵活性和扩展性。
工作流引擎是Workflow的核心组件,它负责解析工作流定义,创建和管理工作流实例,并根据定义中的规则和条件来驱动工作流的执行。
工作流引擎首先读取工作流定义的XML文件,将其解析成一个内部的工作流模型。
工作流模型包括任务、任务之间的关系和任务的执行规则等信息。
然后,工作流引擎根据工作流模型创建一个工作流实例,并将其添加到工作流实例列表中。
工作流实例是Workflow的动态执行过程,它由一组任务实例和它们的执行状态组成。
工作流实例根据工作流定义的规则和条件来驱动任务实例的执行,实现整个工作流的自动化执行。
工作流实例首先根据工作流模型创建任务实例,并将其添加到任务实例列表中。
然后,工作流实例根据任务实例的执行状态和执行规则来选择下一个要执行的任务实例,并将其状态设置为"执行中"。
工作流(Workflow Foundation)从它一诞生就褒贬不一。
至少它确实目前看起来还是比较难用。
在.NET 3.5以及之前的版本中,为了实现工作流,我们还是需要编写相当多的代码。
WF给我们带来的主要有几点是值得了解的1. 通过可视化的界面将流程设计与程序逻辑分离开来。
流程设计的可以只管流程,他们不要知道怎么做。
流程设计的人员可能(或者一定)不会用Visual Studio,他们可以使用一些简单的设计器工具。
例如下面的这个小例子就是一个独立的程序,上面包装了WF的设计器。
结合自定义Activity的设计,可以将业务逻辑隐藏起来。
2.业务逻辑的数据还是需要我们自己设计数据库保存以及维护的这是很多人疑惑的,他们觉得既然有Workflow Foundation,就万事大吉了。
因为工作流实例确实也有数据,而且我们可以持久化将其保存起来嘛。
停!这不是一个正确的想法。
工作流的持久化服务顾名思义,其实主要是为了给我们维护长时间工作的流程信息的(可以在空闲的时候卸载,保存到数据库等)。
大家应该这样理解,Workflow Foundation只是管流程的部分,它不管数据。
没错,它只管流程。
这有什么问题么,它管好这个就够了,而且确实能帮很大的忙,不是吗?这样,我们就可以将注意力放在业务数据的管理,而不是流程状态的管理之类。
3. 一般一套工作流的解决方案需要包含哪些组件请注意上面选中的项目,我来解释一下3.1 WorkflowLibrary 这个项目包含了工作流设计,它是可视化设计的成果。
下图是一个典型的审批流程3.2 OrderApprovalEventType 这个项目包含了工作流设计时可能会用到的一些接口和事件定义。
为什么需要用事件呢?一般我们的流程如果需要等待用户干预,诸如审批之类的情况,就需要这样做,因为它可能不是立即发生的。
注意,接口要标记为ExternalDataExchange,事件参数需要继承ExternalDataEventArgs,而且必须可序列化3.3 Contracts 这个项目是标准的WCF合约定义,因为我们是分了服务器和客户端的,他们之间通过WCF通讯,包括创建流程,以及激发事件等等3.4 Services,这就是具体实现的WCF服务,在这里可以启动工作流运行时,并且按照客户端指令做相应的事情。
工作流参考模型英文Workflow Reference ModelIntroductionIn today's highly competitive business environment, organizations strive to optimize their operations and processes to improve efficiency and productivity. One of the key ways to achieve this is by implementing effective workflow management systems. A workflow refers to the series of tasks, activities, and steps that are necessary to complete a specific process or project. A workflow management system enables organizations to streamline their processes, automate tasks, and monitor progress, leading to improved productivity and better quality output. This article will provide a comprehensive reference model for designing and implementing a workflow management system.1. Workflow DefinitionThe first step in implementing a workflow management system is to define the workflows. This involves identifying the key processes and tasks within an organization and mapping out the sequence of activities required to complete these processes. It is important to involve all relevant stakeholders, including employees, managers, and subject matter experts, in this process to ensure a comprehensive understanding of the workflows.2. Workflow AnalysisAfter defining the workflows, the next step is to analyze them.This involves identifying bottlenecks, inefficiencies, and areas where automation can be implemented. A thorough analysis of the workflows allows organizations to identify areas for improvement and design more efficient processes. Workflow analysis can be done through process mapping, data analysis, and collaboration with the employees involved in the workflows.3. Workflow DesignOnce the workflows have been defined and analyzed, the next step is to design the workflows. This involves determining the sequence of tasks, setting up standards and guidelines, and designing the workflow structure. Workflow design also includes creating decision points, defining inputs and outputs, and identifying the roles and responsibilities of individuals involved in the workflows. It is important to consider the organization's goals, resources, and constraints during the workflow design phase.4. Workflow AutomationAutomation is a key aspect of workflow management systems as it eliminates manual, repetitive tasks and allows employees to focus on more value-added activities. Workflow automation involves implementing software tools and technologies that automate tasks, facilitate communication and collaboration, and monitor progress. Automation can be achieved through the use of workflow management software, integration with other systems, and the use of artificial intelligence and machine learning technologies.5. Workflow ImplementationAfter designing the workflows and automating tasks, the next step is to implement the workflows. This involves training employees on the new processes, communicating the changes, and integrating the workflows into the organization's existing systems and processes. Workflow implementation also involves monitoring and evaluating the workflows to ensure they are delivering the desired outcomes. Feedback from employees and stakeholders should be collected and used to make any necessary adjustments or improvements to the workflows.6. Workflow Monitoring and ControlOnce the workflows have been implemented, it is important to monitor and control them to ensure they are functioning effectively. Workflow monitoring involves tracking the progress of tasks, identifying bottlenecks, and monitoring key performance indicators to measure the efficiency and effectiveness of the workflows. Workflow control involves taking corrective actions when necessary, such as reassigning tasks, reallocating resources, or making process improvements based on the monitoring data.7. Continuous ImprovementWorkflow management is an iterative process that requires continuous improvement. Organizations should regularly review and evaluate their workflows, gather feedback from employees and stakeholders, and identify areas for further optimization. Continuous improvement involves making ongoing adjustments and enhancements to the workflows to ensure they remain alignedwith the organization's goals and objectives.ConclusionImplementing an effective workflow management system is essential for organizations to optimize their operations, improve efficiency, and achieve better outcomes. This reference model provides a comprehensive framework for designing and implementing a workflow management system. By following this model, organizations can streamline their processes, automate tasks, and monitor progress to achieve higher productivity, better quality output, and a competitive edge in the market.8. Workflow IntegrationAnother important aspect of workflow management is integrating workflows with other systems and processes within the organization. This ensures smooth flow of information and tasks, eliminating silos and improving efficiency. Workflow integration involves connecting the workflow management system with other software applications, such as customer relationship management (CRM) systems, enterprise resource planning (ERP) systems, and project management tools. Integration allows data and tasks to be seamlessly transferred between systems, reducing manual effort and data duplication.Integration also enables real-time data sharing, providing stakeholders with a comprehensive view of the workflows and facilitating better decision-making. For example, integrating the workflow management system with a CRM system allows sales teams to access customer data and update it in real-time, improvingcustomer service and sales effectiveness. Similarly, integrating the workflow management system with a project management tool enables project managers to track project progress and allocate resources efficiently.9. Workflow CollaborationCollaboration is a crucial aspect of workflow management as it promotes communication, knowledge sharing, and teamwork. A workflow management system should include features that facilitate collaboration among team members working on a workflow. This includes features such as task assignment, notification system, and document sharing.Task assignment allows workflow managers to assign tasks to specific individuals or teams, ensuring clear accountability and ownership of tasks. A notification system notifies team members about new tasks, task updates, or deadlines, ensuring everyone is aware of their responsibilities and can take appropriate action. Document sharing enables team members to collaborate on documents, share feedback, and make updates in real-time, improving productivity and reducing version control issues.10. Workflow OptimizationContinuous optimization is a key aspect of workflow management. Once the workflows have been implemented, organizations should regularly review and evaluate their effectiveness. This involves analyzing key performance indicators (KPIs) and gathering feedback from employees and stakeholders.KPIs can include metrics such as cycle time, throughput, and error rates, which provide insights into the efficiency and effectiveness of the workflows. Gathering feedback from employees and stakeholders allows organizations to identify areas for improvement and make necessary adjustments to the workflows.Workflow optimization may involve making process improvements, reallocating resources, or reassigning tasks to improve efficiency and reduce bottlenecks. It may also involve exploring new technologies or tools that can further optimize the workflows, such as artificial intelligence or machine learning algorithms that can automate decision-making or predict behavior patterns in the workflows.11. Workflow ScalabilityAs businesses grow and evolve, their workflows may need to be scaled up or down to accommodate changing demands. Therefore, a workflow management system should be designed to be scalable, allowing organizations to easily adjust their workflows as needed. Scalability can be achieved through flexible workflow design, modular architecture, and the ability to easily add or remove tasks and processes. It also involves having a robust infrastructure that can handle increased workflow volume without sacrificing performance or causing system downtime.Additionally, a scalable workflow management system should be able to integrate with other systems and technologies seamlessly,allowing for future expansion or integration with new systems. 12. Workflow Security and ComplianceAnother important aspect of workflow management is ensuring the security and compliance of the workflows. Organizations need to protect sensitive data and ensure that workflows adhere to applicable regulations and industry standards.Workflow management systems should have built-in security features, such as access control, authentication, and encryption, to protect data from unauthorized access or breaches. They should also support auditing and logging capabilities to track and monitor workflow activities, ensuring compliance with regulatory requirements.Moreover, organizations should regularly assess their workflows for risks and vulnerabilities and implement appropriate controls to mitigate them. This may involve conducting risk assessments, implementing cybersecurity measures, and training employees on data protection and compliance standards.ConclusionA well-designed and implemented workflow management system can significantly improve productivity, efficiency, and quality of output for organizations. This reference model provides a comprehensive framework for organizations to follow when designing, implementing, and managing their workflows.By defining and analyzing workflows, designing efficient processes, automating tasks, and integrating systems, organizations can streamline their operations and achieve better outcomes. Collaboration, optimization, scalability, and security are all essential considerations to ensure the ongoing success of the workflows.Continuous improvement is crucial in maintaining the effectiveness of workflows, as organizations need to adapt to changing business demands and leverage emerging technologies. By following this model and continuously optimizing their workflows, organizations can stay competitive and achieve their goals in today's fast-paced business environment.。
Workflow简介⼯作流介绍内容索引1简介 (1)1.1⽬的 (1)1.2范围 (1)1.3如何得到这篇⽂档 ................................................................................ 错误!未定义书签。
2⼯作流实现机制 (1)2.1⼯作流的组成部分 (1)2.1.1单据类型(Item Type) (1)2.1.2活动(Activity) (1)2.1.3流程(Process) (1)2.1.4消息(Message) (1)2.1.5函数(Function) (2)2.1.6通知(Notification) (2)2.1.7查找类型(Lookup Type) (2)3⼯作流的定义 (2)3.1创建流程定义 (2)3.1.1从下往上定义 (2)3.1.2从上往下定义 (3)3.1.3打开保存单据类型 (3)3.2定义⼯作流组件 (4)3.2.1单据类型(Item Type) (4)3.2.2查找类型(Lookup Type) (8)3.2.3消息(Message) (9)3.2.4活动(Activities) (11)3.3定义⼀个流程图 (14)3.3.1增加⼀个节点 (15)3.3.2定义⼀个节点 (15)3.3.3定义活动属性值 (16)4在应⽤中调⽤⼯作流 (17)1简介1.1 ⽬的说明Oracle ERP⾥⼯作流的原理在Oracle ERP⾥定义并定制⼯作流1.2 范围Oracle ERP⾥⼯作流引擎的实现原理以及如何利⽤Workflow Builder定义⼀个流程,以及在程序⾥调⽤已经定义好的流程保证业务根据流转规则流转。
2⼯作流实现机制2.1 ⼯作流的组成部分⼯作流的流程主要由以下组件(Component)构成:单据类型、流程、活动、函数、消息、通知和查找类型。
单据类型是⼀种分类对象,其它的对象都属于⼀个单据类型。
工作流开发框架【实用版】目录1.工作流开发框架概述2.工作流开发框架的核心功能3.常见工作流开发框架及其特点4.如何选择适合的工作流开发框架5.工作流开发框架的未来发展趋势正文【工作流开发框架概述】工作流开发框架,顾名思义,是为了帮助开发者更高效、便捷地实现工作流(Workflow)而设计的一种软件工具。
工作流指的是一系列有序的任务,这些任务在各个系统或应用程序之间流转,以完成特定的业务目标。
在现代企业中,工作流在很多业务场景中发挥着重要作用,例如审批流程、任务分配、订单处理等。
因此,一个优秀的工作流开发框架能够大大提高企业的运营效率和协同能力。
【工作流开发框架的核心功能】一个完整的工作流开发框架通常具备以下核心功能:1.流程建模:框架应提供可视化的流程建模工具,让开发者能够轻松地绘制和设计工作流。
2.流程引擎:流程引擎是工作流开发框架的核心组件,负责实际执行工作流中的任务,并在任务完成后将流程流转至下一个环节。
3.任务分配:框架应提供任务分配功能,允许开发者自定义任务的分配方式,例如按照角色、部门等条件分配。
4.流程监控:框架应提供实时的流程监控功能,让开发者和企业能够掌握工作流的运行状况,及时发现和处理问题。
5.异常处理:框架应提供异常处理功能,让开发者能够定义工作流中可能出现的异常情况,并设置相应的处理策略。
【常见工作流开发框架及其特点】市场上有很多优秀的工作流开发框架,以下是其中几个比较常见的框架及其特点:1.Activiti:Activiti 是一个开源的工作流引擎,提供了强大的流程建模和执行功能。
它支持 BPMN2.0 规范,并提供了丰富的 API,方便开发者进行集成和扩展。
2.Camunda:Camunda 是一个用于工作流自动化和业务流程管理的开源框架。
它提供了一个易于使用的图形化建模工具,支持 BPMN 2.0 和CMMN 1.1 规范,并具有强大的执行引擎。
3.Flowable:Flowable 是一个轻量级的工作流开发框架,它基于Java 并提供了易于使用的 API。
fragment基本概述Fragment是Android开发中一个重要的组件,它可以被认为是一个独立的模块,用于构建灵活而复杂的用户界面。
本文将对Fragment进行基本概述,介绍它的定义、特点以及使用场景。
Fragment是在Android 3.0引入的,在此之前,Android只有Activity作为界面的基本单元。
Fragment的出现使得开发者可以更灵活地管理界面和组件,实现更多样化的用户界面。
Fragment类似于Activity,但有一些关键的区别。
一个Activity可以包含多个Fragment,并且这些Fragment可以被动态添加、移除和替换。
与Activity不同,Fragment可以在不同的Activity之间共享和重用,使得界面的组织和复杂性得到了很大的增强。
Fragment可以看作是Activity的一部分,但它具有自己的生命周期和事件回调。
例如,Fragment可以接收和处理用户输入事件,与Activity进行通信等。
Fragment也有自己的布局和视图,可以独立管理和更新。
使用Fragment的主要优势之一是其适应不同屏幕尺寸和设备方向的能力。
通过动态管理Fragment,可以在一个Activity中根据屏幕大小和方向动态地添加或移除Fragment,以适应不同的设备和用户界面要求。
与Activity一样,Fragment也有自己的生命周期,包括onCreate、onStart、onResume、onPause、onStop、onDestroy等方法。
在Activity生命周期变化时,Fragment的生命周期也会相应地发生变化,因此可以在合适的时机执行逻辑或保存状态。
Fragment在Android开发中有广泛的应用场景,特别是在多面板布局和可复用组件方面。
它可以使得应用界面更加灵活、模块化和可扩展。
例如,可以使用Fragment实现一个界面同时显示地图和其他信息,或者在平板电脑上实现一个列表和详细信息的显示等。
Leica GeosystemsQuickStart GuideProduct Leica Cyclone REGISTER 360 1.4.1Date 3 January 2018From HDS Software Product ManagementContentsIntroduction (2)Installation (3)Licensing Setup (4)Basic Workflow (6)Launch (7)Basic Configuration (7)General Settings (8)Link Settings (8)Cloud-to-Cloud options (8)General Registration Information (11)Import (11)Review and Optimize (19)Finalize (25)Report (27)Leica Geosystems AGHeinrich-Wild-StrasseCH-9435 HeerbruggSchweizIntroductionWelcome to Cyclone REGISTER 360. Bellow you will find a simple guide for getting started in the software.Cyclone REGISTER 360 is designed to bring speed, scale and simplicity to your digital reality workflows thanks to a new visual project interface and guided workflows. New and experienced users alike will appreciate that the registration process has been streamlined while maintaining the uncompromising quality you have come to expect of Leica Geosystems’ software solutions.Many users will require little to no assistance to complete their first project while some users who are completely new to the registration process may find it helpful to read this quick start guide in full.Please remember that every project will present its own challenges. This guide is not designed to address every possible scenario but rather to provide a framework which should be modified and amended based on project needs.If you require more advanced help, please review the resources in the assistant panel (discussed below) or contact Leica Geosystems’ expert support staff.Thank you for choosing Cyclone REGISTER 360.-The Leica Geosystems HDS Software Product Management TeamInstallationNOTE! You must have Administrative privileges on your computer to correctly installand license Cyclone REGISTER 360.1. Right-click on the Cyclone REGISTER 360 Setup File and select "run as administrator".2. Follow the directions in the InstallShield Wizard.3. When prompted, choose your Project Storage location.NOTE! The storage folder for Cyclone REGISTER 360 should NOT be the same folder as the JetStream Storage folder if JetStream is installed on the same computer.4. Complete the installation by selecting “Finish”.Licensing SetupLeica Cyclone REGISTER 360 will run for any user with a valid Cyclone REGISTER license with current CCP or CCP valid as late as September 1, 2017. (It will run non-concurrently to Cyclone REGISTER.) For users running Cyclone REGISTER 360 off its own license, please follow the below instructions to activated your license.NOTE! Leica Cyclone REGISTER 360 is only supported by the latest version of theLeica Client License Manager (CLM), version 1.6.2 or newer.NOTE! You must have an Internet connection to enable your license. If you do not,please review our “Leica Cyclone and CloudWorx Client License Management System” document that goes over setting up an E ntitlement ID (i.e., license) off-line.1. Once you have installed Cyclone, open the Client License Manager for Floating Licenses.2. Located here: Start Menu/All Programs/Leica Geosystems/Client License ManagerNOTE! Be sure to choose the Floating option (there are two CLMs and the NodelockedCLM will not activate your license)3. Choose the "Activate new licenses" option.4. Enter your Entitlement IDs (EID) in the open field. To enter multiple EIDs separate them with asemicolon ";"5. After you have entered your EID choose the "Check for Activateable licenses" link in the bottom rightof the page6. Once your licenses are activated you can start using Cyclone REGISTER 360.Basic WorkflowCyclone REGISTER 360 guides the user through the registration process. At the top of the software window you will see a workflow bar that includes four steps:(1) Import(2) Review and Optimize(3) Finalize(4) ReportThese will be the four major stages of your project. Below, we will walk you through a basic end-to-end workflow within Cyclone REGISTER 360. This is not intended to be exhaustive. You should reference the built-in assistant panel and help files for more detailed guidance. If you need more information about any tool, hover over the button and press F1 to be sent to the glossary or command index entry for the button within the helpfile.Launch1. To begin, launch Cyclone REGISTER 360.1.1. The software will open on the Project Explorer Window.2. Either open an existing project or click “Create New Project”2.1. Enter a project name and click “OK”Basic ConfigurationOnce the program is opened you can access the settings options from the title tool bar in the upper left of the program.General SettingsOnce you open the Settings dialog, the General tab will allow you to change your default units of length as well as set your preferred decimal precision.In this tab you also have the option to turn off the creation of Setup Archives during import, this setting enables the creation of archive files and is required for most publishing options.In this tab you can also turn off transition animations that occur when moving between setups or otherwise changing views.Link SettingsThe Links tab allows you to customize your error thresholds for Links. You can adjust what levels of error will be represented by your green/yellow/red link lines. By default, these will be set to 0.015 and 0.02 m respectively.Cloud-to-Cloud optionsOptions that control how Cloud-to-Cloud operates can be found in the setting menu.•Max Iterations:o This is how many times the programs will try to fit the clouds together before completing the alignment.•Search Radius:o This setting sets the search radius for matching surfaces•Max Point Density:o Will increase the density of the Cloud-to-Cloud points used in the process •Normal Threshold:o During Cloud-to-Cloud formation, the normal threshold is used to determine how valid the surfaces are. A higher value means that the surfaces do not need to be as valid. Theresult of a higher value would bemore surfaces, but potenally lower validity of thesurfaces created.ProjectsClick the Project & Storage icon in the upper left title bar to adjust storage folder locations and other project settings.In this view, you can see all the projects that you have stored in your Project storage.Here you can:■Manage your saved projects■Delete projects■Copy a project to another storage location using the Relocate option.■Archive or Import a Cyclone REGISTER 360 project (*.raf). To create a .raf file, select the project and click the Archive button.■Import a saved archive file. To do so, simply place the. raf file inside of your Project Storage directory and then click the Import button. Cyclone REGISTER 360 will then provide you a list of any archive it finds in that location that can be added to your active Projects.StorageThe Storage tab allows you to configure multiple Project Storage locations. You can use this feature to create and toggle between datasets on multiple drives. For best results, use internal SSD drives and create separate folders for Storage and Archive.General Registration Information■Cyclone REGISTER 360 requires 3 matching targets between setups to form a target link.■Cloud to Cloud links can be used to join setups with less than 3 matching targets.■Setups included in separate Sitemaps in the Import area will be registered into separate bundles.■The maximum amount of auto-detected/shown links is 50. This applies to links found after Visual Alignment, Split View, and shown suggested links.■You must have at least one Sitemap which has all setups in one bundle to proceed to the Finalize area.■The bundle must be optimized successfully (no dotted Link lines) to proceed to the Finalize area.■The minimum screen resolution supported is 1280x800.Import3. You will now find yourself in the Import stage. You will notice on the left that there are three ways tobring data into Cyclone REGISTER 360.3.1. Cyclone REGISTER 360 can accept the following types of scan, image and text files:File Types Supported Formats Binary Point Clouds .e57.ptgControl File .txt containing:Point numberNorthingEastingElevationCommentImagery .bmp.jpeg.pngFARO TLS data .fls.fpr.fwsFARO RawLeica HDS scanner data BLK360 (direct via WiFi or .blk files from theBLK360 Data Manager utility)C-SeriesP-SereisText .ptxZ+F .zfc.zfs.zfprj3.2. Different file types do not need to be added separately; they can all be added and importedtogether.3.3. “Drag files here” allows you to drag-and-drop individual files, or a folder containing files, into thesoftware.3.4. “Browse Files” will launch a Windows File Exploer window through which you can navigate to thefiles to be imported.3.5. “Import BLK360” will launch a new Cyclone REGISTER 360 window that will allow you to connectto a local BLK360 Imaging Scanner and select individual files to import.3.5.1. Connent your computer’s wifi to the BLK360 using the windlows wireless connection(Windows 10 is used in this example). The wireless password is located on the inside of the battery door of the BLK360 scanner.3.5.2. C lick “Find & Connect Device"3.5.2.1. Once connected a list of scans is shown along with the Battery level, Serial numberof the scanner, firmware version, memory used and Capture settings.The scanner must have at least 20% power to enable the Download button.3.5.2.2. Select the scans to import by marking the check boxes next to each setup. Selectingscans in the BLK360 import dialog will check the scans for import in the Cyclone REGISTER 360 import area though all scans will be visible within the import area. Click "Download" when you have identified the scans you wish to work with.3.5.2.3. Capture settings can be changed in this dialog. Use the pull downs to select scandensity (high, medium, low), image quality (LDR or HDR) and Image exposue (EV-5 to +5).3.5.2.4. The Add to Project button will always display all scans witin the CycloneREGISTER 360 import area, however only scans which were selected within the import dialogue will be queued for import. The image below shows the three scans selected for import above checked for import.3.5.2.5. You may also delete scans from your BLK360 from within this window. Select thescans by checking the boxes to the left of the scans and the click the Delete button.Once scans are deleted, they are permanently removed from the device so the user may wish to download them locally via the BLK360 Data Manager as a backup before any deletion from the machine.4. Once you have added your data via one of the methods noted above, you will also notice on the rightthat there are three options for how to register the data you are bringing in which can be used for any of the above import types.4.1. “Auto Target” should be used when Black and White targets are present within the data set.Cyclone REGISTER 360 will automatically search for these targets and register the setups based on those shared targets. Targets do not need to be picked, labelled or matched. Cyclone does it all automatically.4.2. “Auto Cloud” should be used when importing unregistered data that does not contain targets. Thissetting will conduct a preliminary cloud-to-cloud alignment and register the setups based on shared geometry between scans. You do not need to pick this option. Cyclone REGISTER 360 does it all automatically.4.2.1. “SmartAlign” is a tool that will aid the Auto-Cloud search by lowering the number of links tosearch by only searching the links specified by the user. All setups not identified by the userwill be compared to all other setups. Once SmartAlign is selected, links can be createdbetween setups by time, distance, or by manually dragging one setup to another.Note! The SmartAlign option will not be enabled unless a background image is in use(blank is fine) and setups have been dragged into the Sitemap area.4.3. “Pre-Registered” should be used for data that has already been registered in another application.This setting will maintain the alignment and transformations present within that data set and generate the link objects unique to Cyclone REGISTER 360.4.4. If no options are checked, Cyclone REGISTER 360 will import the files but will not attempt to formany links.5. The last section of the import stage is the map tool. This map can be used to acquire a satellite imageto serve as a sitemap for the project. (Optional).5.1. You must be connected to the internet to use the map.5.2.You can scroll to a known location or enter a sreet address, city name, or ZIP code. You must thenclick “Lookup” to search the map.5.3. Once you are satisfied with the positioning of the image on screen, click “Get Image” to save thescreen and automatically set it as your sitemap background image.5.4. If you wish to use your own image as a sitemap, you can add that image via the “Drag files here”or “Browse Files” options.6. Once you are satisfied with the data that has been added and made the appropriate selectionsregarding registration options, c lick the large, red “Perform Import” button in the lower right corner of the screen.Review and Optimize7. Once the import is complete, the user will be placed within the Review and Optimize stage. Here,they can QA and refine the registration and produce assets to include within the final Registration Report.7.1. On the left-hand side, you will see a complete directory of all data within the project, clusteredunder three tabs: “Project” which contains sitemaps, bundles, setups, and links, “Assets” which includes all image assets both imported and those created via the “Capture Screen” button, and “Controls” which includes any imported .txt files cont aining survey control information.7.2. The user can access the properties for an object by selecting that object in the project panel andviewing the “Properties” panel on the right-hand side of the screen.7.3. The “Properties” panel can be viewed with “Advanced Mode” On or Off depending on whether theuser wishes to see a more graphical or more tabular summary of their data. The Advanced mode also offers additional link options.7.4. Next to the “Properties” panel, the “Assistant” panel contains specif ic advice and informationpertaining to each stage of the registration.7.5. Within the Review and Optimize stage, the user may refine their registration through a variety oftools.7.5.1. T he user can delete setups and links and re-form them.7.5.2. T he user may also refit targets at this stage to improve the registration.7.5.3. T he user can set a unique User Coordinate System to orient their project for better viewing.7.6. The user may view their project either as a “Sitemap” (2D, top-down) view, or as 3D cloud byhovering over the icon in the lower right-hand corner of the workspace and selecting the appropriate viewing option.7.6.1. T he user should use the “TruSlicer” view to QA their regsiration. The point clouds from eachsetup will be colored differently. A good alignment will show a thorough intermixing of colored points and matching geometry in areas of overlap. The user can control the thickness and location of the slice via the sliders at the top left of the workspace.7.7. Depending on the user’s selection, a “Navigation” bar may appear in the top left of the workspaceor an “Action Bar” at the bottom that will enable different tools that are only accessible with the user’s present selection.NavigationBarAction Bar7.8. At any point, the user may access their “Settings” by clicking on the gear icon at the very top leftof the screen to change units and set the error threshold for green, yellow and red links.7.9. At any point, the user may click the “Capture Screen” button to save an asset which can ch osento include in their final Registration Report. These assets will appear in the “Asset” tab in the project panel at left.7.10. T o increase working space, the user may collapse either or both side panels by clicking the arrowat the sides of the panel.Finalize8. Once the user is satisfied with their registration, they may move on to the Finalize stage by clickingthe “Finalize” bar at the top of the screen.8.1. Within the “Finalize” stage the user can make final adjustments to the presentation of their projectby turning On or Off the point cloud, setups, links, sitemap, and setup labels.8.2. When the user is satisfied with the presentation of the image, they may click “Accept” in the ActionBar. This will freeze the image on screen to serve as the Registration Report cover image.8.3. T hen click the large, red “Accept” button in the Properties panel to advance to the Report stage.Report9. Within the Report stage, the user will have many customization options.9.1. They may enter their name under the “Certified by” line as well as their Title or Position, CompanyName, and URL as well as a Heading for the Regsitration Report. To update the Report with this information, click “Update Report.”9.2. The user may also select what they want to include within their report by checking or uncheckingthe boxes for the sitemap image (the large image captured in the Finalize stage), a logo (whichthey can add via Drag-and-Drop next to the check boxes, the Links Table, Targets Table (histogram of errors for links displayed as a matrix of setups), and Assets. To select or deselect individual assets for inclusion, the user may click “Configure.”Check thedesiredoptions here.9.3. Lastly, the user has many publishing options for how they wish to share their project. TheRegistration Report will always be created as a .pdf, however the user can choose to optionally publish their project to TruView Local or TruView Enterprise if they have a Cyclone TruView PUBLISHER or Cyclone PUBLISHER Pro License, TruView Cloud if they have a TruView Cloud subscription, JetStream Local or JetStream Enterperise if they have a Cyclone JetStream PUBLISHER or Cyclone PUBLISHER Pro License, or as an.e57 file.**Creates *.jsv files for viewing point clouds and imageryin JetStream ViewerNo additional license required E57 compatible products of users’ choice E57No additional license required PTX compatible products of users’ choice PTXNo additional license required PTS compatible products of users’ choice PTSNo additional license required PTG compatible products of users’ choice PTG9.4. The user should select all of the publication outputs they wish to produce from this list and thenclick the large, red “Publish” button in the properties panel. This will allow for single, batch publishing of all your selected outputs.9.5. All of the outputs will be created and saved to the location designated by the user.。
ruoyi-workflow 用法Ruoyi-Workflow是一款基于SpringBoot和Activiti的工作流引擎,用于简化企业的工作流程管理。
使用Ruoyi-Workflow可以快速构建和部署工作流,管理流程节点和用户任务,并且提供了强大的流程监控和管理功能。
以下是使用Ruoyi-Workflow的一些常见用法:1. 引入Ruoyi-Workflow依赖:在项目的pom.xml文件中添加Ruoyi-Workflow的依赖,并进行Maven或Gradle的构建。
2. 编写工作流定义文件:使用Activiti的BPMN2.0标准来定义工作流程,可以使用可视化的工作流设计器如Activiti Modeler或者Ruoyi-Workflow的在线流程设计器进行编辑。
3. 配置工作流引擎:在SpringBoot的配置文件(application.yml或application.properties)中配置Ruoyi-Workflow的相关属性,如数据库连接和流程文件路径等。
4. 集成工作流引擎:在SpringBoot的启动类(Application.java)中添加@EnableWorkflow注解,启用工作流引擎。
5. 定义流程节点和用户任务:使用Ruoyi-Workflow的注解来标识流程节点(@ProcessNode)和用户任务(@UserTask),并定义每个节点的处理逻辑。
6. 部署和启动工作流:使用Ruoyi-Workflow的API来进行流程的部署和启动,可以通过代码或者RESTful接口来实现。
7. 完成用户任务:用户可以通过Ruoyi-Workflow的任务管理界面来完成待办任务,或者通过API来自动完成任务。
8. 监控和管理流程:Ruoyi-Workflow提供了丰富的流程监控和管理功能,包括流程实例查询、历史记录查询、流程图展示等。
9. 扩展和定制:Ruoyi-Workflow支持自定义流程节点和任务处理器,可以根据业务需求进行扩展和定制。
A Workflow Fragmentation Framework for Enterprise Grid Workflow SystemsKwanghoon KimDepartment of Computer Science Contents Convergence Software Research Center KYONGGI UNIVERISTYSuwonsi Kyonggido,South KoreaEmail:kwang@kgu.ac.krMinseok OhDepartment of Electronics Engineering Contents Convergence Software Research Center KYONGGI UNIVERISTYSuwonsi Kyonggido,South KoreaEmail:msoh@kgu.ac.krAbstract—In this paper1,we focus on a workflow distribution methodology for deploying the workflow enactment functional-ity over enterprise grid computing environments.The essential idea of the workflow distribution methodology is about how to fragment a workflow model and how to allocate the fragmented workflow models over the workflow enactment infrastructure based upon an enterprise grid computing environment.The workflow distribution methodology,as an impeccable solution to implement the essential idea,proposed in the paper is a workflow fragmentation framework,which is broken down into three fragmentating approaches—vertical workflow fragmen-tation approach,horizontal workflow fragmentation approach and hybrid of both.Conceptually speaking,the typical vertical fragmentation approach implies semantic-driven fragmenta-tion methods,while on the other the horizontal fragmentation approach is to represent syntactic-driven fragmentation meth-ods.Based on the the ICN-based structured workflow model, this paper formalizes the proposed approaches of the workflow fragmentation framework and their detailed algorithms,and applies one of the approaches to an ICN-based structured workflow model as an operational example.Keywords-ICN-based workflow model,workflow distribution, workflow fragmentation,enterprise workflow gridI.I NTRODUCTIONA Workflow Management System(WfMS)is defined as a system that partially or fully automates the definition, creation,execution,and management of work procedures (workflows)through the use of software that is able to interpret the workflow definition,interact with workflow participants and invoke the use of IT tools,scripts and applications.Furthermore,the infrastructures[5]for WfMSs’deployment and enactment services have been swiftly evolv-ing to the advanced distributed computing environments, such as grid,P2P and cloud computing environments.Those advanced distributed computing environments are becom-ing a catalyst for emerging the concepts[9]of enterprise workflow grid/cloud technologies.In order to realize the enterprise workflow grid concept[9],a chain of essential techniques,which are directly related with fragmentation and distribution of workflow models,are basically required, 1This research was supported by the National Research Foundation’s Basic Research Grant,No.2009-0075651,and the GRRC Research Project of Gyeonggi Province.and at the same time when we develop these techniques, it is important to consider the various perspectives—control flow,dataflow,social and organizational perspectives—of a workflow model.Straightforwardly,the so-called workflow fragmentation framework ought to be one of the most essential techniques that we have to develop for realizing a fundamental infrastructures of the enterprise workflow grid/cloud systems.The purpose of this paper is to propose an efficient work-flow fragmentation framework that is able to cope with from fragmenting workflow models to distributing the fragmented workflow models onto each of the enactment components of the underlying enterprise workflow grid system.Also, we assume that the proposed framework is basically based upon the information control net(ICN)methodology[11][12] in terms of representing wokflow models;Note that the ICN-based workflow modeling methodology was originally developed to describe and analyze informationflows by capturing several entities within work procedures,such as activities,roles,actors,activity precedences,applications, and relevant data/repositories.Particularly,thefinal model produced by the methodology is so-called an ICN-based structured workflow model[10][12]that is preserving the proper nesting and matched pairing properties[8].In organizing the paper,we start from defining the ba-sic concept of enterprise workflow grid system and its architectural configurations in the next section.And,in the remainder sections of this paper,we are going to deploy our workflow fragmentation framework by defining the pos-sible workflow fragmentation approaches with the concepts of vertical and horizontal fragmentation methods,and by describing how to break an ICN-based structured workflow model[12].Finally,we try to verify the feasibility of the proposed framework through an operational example.II.E NTERPRISE W ORKFLOW G RID A RCHITECTURES As an infrastructure for enterprise workflow grid sys-tems,[9]already proposed a domain-specific workflow grid configuration framework,which is called the work-flow knowledge Grid/P2P architectural framework[9],that generated a generic enterprise workflow grid enactment2010 IEEE 24th International Conference on Advanced Information Networking and Applications WorkshopsFigure1.The Layered Workflow Knowledge Grid/P2P Conceptual Architecturearchitecture for handling massively parallel and very large scale fragmented workflow models on a Grid/P2P/Cloud computing environment.In this section,we briefly introduce the architecture,which is the Layered Workflow Knowledge Grid/P2P Architecture[9]of Figure1,as an infrastructure for the workflow fragmentation framework.The layered workflow knowledge Grid/P2P architecture is pertaining to the layering property and the symmetric pattern so as to be satisfied with the primary requirement, Scalability,for massively parallel and very large scale workflows.The layered nodes of the architecture collabo-ratively work together to provide the workflow enactment services to the fragmented workflow models generated from the workflow fragmentation framework.Also,each of the nodes cooperates with four different managers—workflow procedure modeling manager,workflow administration and monitoring manager,workflow client manager and workflow Grid/P2P application and web service request broker—in order to load and enact its own fragment of the workflow model generated from the workflow fragmentation frame-work.Particularly,the Workflow Modeling Manager is the most important component to implement the fragmentation approaches.The primary functionality of this manager is (1)to define a workflow model,(2)to break the model into a set of fragments and(3)to disseminate the fragments each of the layered nodes of the enterprise workflow grid system.Therefore,this manager is functionally related with the workflow fragmentation framework proposed in the paper,because a specific method out of the fragmentation approaches must be embedded into the workflow modeling manager.Summarily speaking,the ICN-based structured work-flow modeling methodology and the workflow knowledge Grid/P2P enactment architecture become the technological backgrounds for the workflow fragmentation framework to be proposed in the next section.That is,the modeling methodology is the analytical basis of the workflow frag-mentation approaches,while on the other hand,the enact-ment architecture is the operational basis of the workflow fragmentation approaches.III.W ORKFLOW F RAGMENTATION F RAMEWORK Based upon the ICN-based structured workflow model[12],this section formally defines the basic concept of a workflow fragmentation framework.Conceptually speaking,the primary goal of the framework is to systematically summarize a set of fragmentation approaches that reasonably break a workflow model into a group of fragments andfinally distribute the fragments over the previous layered architecture’s components running on an enterprise workflow grid computing environment[9]. In order to enact the instances of the workflow model, each node(that are associated to the enactment of the workflow model’s instances)takes in charge of collaborative enactments of the fragmented workflow models.At this moment,it is important tofigure out how to fragment a workflow model,which can be done vertically,horizontally or in hybrid.The vertical fragmentation implies semantic-driven distribution purporting the collaborative enactment of the fragments,while the horizontal fragmentation works for syntactic-driven distribution mainly focusing on the instance types of the corresponding workflow model.In this section,we formally describe the basic principles of the workflow fragmentation framework providing vertical and horizontal fragmentation approaches and their detailed algorithms.A.Vertical FragmentationAn ICN-based structured workflow model consists of a set of activities and their temporal precedences.In order to enact the model on a distributed computing environment(which is supposed to be an enterprise workflow grid architecture[9]), it is necessary to break the model into several fragments and distribute them over the computing nodes.Actually,the meaning of the vertical fragmentation implies semantical grouping of the activities of the model,and each group can be allocated into each node of the computing environment. Of course the vertical fragmentation can be done by random grouping method,and it however ought not to be a reason-able approach,because it’s hard to estimate its operational performance,as we know.Conclusively,the vertical fragmentation approach based on the semantic grouping methods is to make activity-groups based upon the semantic components—roles and actors—assigned to the structured workflow model.As an example,we present one of the semantic grouping meth-ods,which is called the role-based workflow fragmentation method that is made up of the role-based workflow frag-ment model and its automatic generation algorithm.The fundamental idea of the method is that the activities to be performed by a same role are distributed to a same computing node.The formal definition of the role-based workflow fragment model is described in[Definition1].The model repre-sents two types of information—nodeflows and fragmented activities—through which we are able to get precedence (predecessor/succesor)relationships among nodes as well as distributed activities of each node.[Definition1]Role-based Workflow Fragment Model.A role-based workflow fragment model is formally defined as =(ξ,ϑ,S,E),over a set R of roles and a set A of activities,where,•S is afinite set of the initial nodes;•E is afinite set of thefinal nodes;•ξ=ξi∪ξo/*Node Flow:successors and predecessors */where,ξo:R−→℘(R)is a multi-valued function mapping a node to its sets of(immediate)successors, andξi:R−→℘(R)is a multi-valued function map-ping a node to its sets of(immediate)predecessors;•ϑ=ϑi∪ϑo/*Fragments and Neighbor Fragments*/ where,ϑi:A−→℘(R)is a multi-valued functionmapping a set of fragmented activities into the node,η;andϑo:A−→℘(R)is a multi-valued function mapping a set of neighbor fragments’activities to the node,η;In terms of fragmenting of a workflow model,it is definitely necessary to automatically construct a role-based workflow fragment model.In other words,it is very important to provide an automatic methodology for implementing the semantic grouping method.Therefore, we conceive an algorithm for automatically construct the role-based workflow fragment model from an ICN-based structured workflow model.The following is the algorithm that is called the role-based workflow fragmentation algorithm.The time complexity of the vertical fragmentation algorithm is O(n),where n is the number of activities in the structured workflow model, because the function has a single for-loop with repeating as many as the number of activities.Therefore,the overall time complexity is O(n).PROCEDURERole-based Workflow Fragmentation AlgorithmInputA Structured Information Control Net,Γ=(δ,ρ,λ,ε,π,κ,I,O);OutputA Role-based Workflow Fragmentation Model,=(ξ,ϑ,S,E);BEGINFOR(∀α∈A)DO/*ξ=ξi∪ξo*/Addεr(α)Toξi(εr(all members ofδo(α)));Addεr(all members ofδo(α))Toξo(εr(α));/*ϑ=ϑi∪ϑo*/AddαToϑi(εr(α));Addδo(α)Toϑo(εr(α));END-FOREND-PROCEDUREB.Horizontal FragmentationOn the other hand,the conceptual meaning of horizon-tal fragmentation of a workflow model implies syntactical grouping of activities.That is,the syntactic components of the structured workflow model,such as OR-nodes and AND-nodes,becomes the criteria for grouping the activities. Conclusively,the reachable control-pathes[7]of a structured workflow model become the horizontal fragments that are distributed into the computing nodes.[Definition2]Controlpath-based Fragment Model of an ICN-based structured workflow model.Let W be a CpFN, a control-path fragment net,that is formally defined as CpFN=( ,κ,I,O)over a set of activities,A cp,and a set of transition-conditions,T cp,where• = i∪ owhere, o:A cp−→℘(α∈A cp)is a multi-valued mapping of an activity to its set of(immediate)succes-sors,and i:A cp−→℘(α∈A cp)is a single-valuedmapping of is a multi-valued mapping function of an activity to its set of(immediate)predecessors;•β=βi∪βowhere,βi(α):a set of control transition conditions,τ∈T cp,on each arc,(βi(α),α);andβo(α):a set of control transition conditions,τ∈T cp,on each arc, (α,βo(α)),whereα∈A cp;•I is afinite set of initial input repositories of the corresponding structured workflow model;•O is afinite set offinal output repositories of the corresponding structured workflow model;PROCEDURE Controlpath-based Frag.AlgorithmInput A Structured Workflow Process Model,Γ=(δ,γ,λ,ε,π,κ,I,O);Output A Set of Controlpath-based Fragment Models(CpFNs),∀W=( ,κ,I,O);Initialize CpN←{∅};/*The empty net of CpFN.*/PROCEDURE H-FRAGMENTATION(In s←{αI},CpFN)/*Re-cursive Function*/BEGINv←s;CpFN.A cp←CpFN.A cp∪{v};WHILE((u←δo(s);)={αF})SWITCH(What type of the activity,u,is?)DOCase’serial-type activity’:w←u;CpFN.A cp←CpFN.A cp∪{w};CpFN. o(v)←w;CpFN. i(w)←v;CpFN.βo(v)←κo(s);CpFN.βi(v)←κi(s);break;Case’conjunctive-type(AND-split)activity’:w←u;CpFN.A cp←CpFN.A cp∪{w};CpFN. o(v)←w;CpFN. i(w)←v;CpFN.βo(v)←κo(s);CpFN.βi(v)←κi(s);FOR(eachof∀a∈δo(u))DOx←a;CpFN.A cp←CpFN.A cp∪{x};CpFN. o(w)←x;CpFN. i(x)←w;CpFN.βo(w)←κo(u);CpFN.βi(w)←κi(u);END-FORFOR(eachof∀a∈δo(u))DOCall PROCEDURE H-FRAG(In s←a,CpFN);END-FORexit();Case’disjunctive-type(OR-split)activity’:w←u;CpFN.A cp←CpFN.A cp∪{w};CpFN. o(v)←w;CpFN. i(w)←v;CpFN.βo(v)←κo(s);CpFN.βi(v)←κi(s);FOR(eachof∀a∈δo(u))DOCall PROCEDURE H-FRAG(In s←a,CpFN);END-FORexit();Default:/*OR-join activity or AND-join activity*/w←u;CpFN.A cp←CpFN.A cp∪{w};CpFN. o(v)←w;CpFN. i(w)←v;CpFN.βo(v)←κo(s);CpFN.βi(v)←κi(s);break;END-SWITCHs←u;v←w;END-WHILEw←u;CpFN.A cp←CpFN.A cp∪{w};/*u is equal toαF.*/CpFN. o(v)←w;CpFN. i(w)←v;CpFN.βo(v)←κo(s);CpFN.βi(v)←κi(s);PRINTOUT CpFNsEND-PROCEDUREIn order to formally define the horizontal fragmentation approach,it is necessary to define the controlpath-based fragment model and its generation algorithm.The defini-tion of the controlpath-based fragment model is given in [Definition2],and the horizontal fragmentation algorithm described in the followings fragments an ICN-based struc-tured workflow model,as an input,into several controlpath-based fragment models.The time complexity of the horizon-tal fragmentation algorithm is O(n),where n is the numberof activities in the structured workflow model,because thefunction,H-FRAGMENTATION(),is recursively traversingeach activity in only once.Therefore,the overall timecomplexity is O(n).C.Hybrid of the ApproachesIt is possible to make a hybrid fragmentation approachby combining both the vertical approach and the horizontalapproach,as we can expect.That is,as an example,acontrolpath-based fragment model generated through thecorresponding algorithm also can be vertically fragmentedinto by applying the role-based fragmentation method.Therefore,as the result of the hybrid method,a set ofthe role-based re-fragment models is constructed from thecontrolpath-based fragment model,and the re-fragmentedmodels are disseminated onto the nodes of a workflowgrid computing environment.This hybrid approach might befitted very well into the very large scale workflow models,which are largely built and characterized in the recentmodernized and computerized organizations.Because of thepage limitation,we would not describe the details of thehybrid approach.D.Operational Example of the Vertical Fragmentation Ap-proachIn order to verify the workflow fragmentation framework,we would apply the vertical fragmentation approach to asimple ICN-based structured workflow model,as an opera-tional example.Figure2depicts the graphical representationof the example workflow model.Also,Figure3is tographically illustrate a set of vertically fragmented workflowmodels represented by the role-based workflow fragmentmodel.The left-hand side of thefigure is the graphicalrepresentation of the role-based workflow fragment model,and the right-hand side is thefinal activity fragmentsand the distribution status to the associated computingnodes.Particularly,the graphical primitives of the role-based workflow fragment model are oval(node),directed arcwith label(activity),solid dot(•:parallel)and hollow dot(◦:decision)as shown in thefigure.Finally,Table I is the textual representation of the role-based workflow fragment model automatically produced bythe algorithm.For an instance,the activities,αA,αD,αE, on the incoming directed arcs of the node,ηR−X,are theassigned activities to the corresponding node.As result,wegive the formal representation of the role-based workflowfragmentation model of the simple structured workflowmodel in Table1,which is automatically generated byapplying the algorithm.As you can see,the table shows thenodeflow information and each node’s fragmented activitiesbased upon3nodes and6elementary activities.Figure 2.A Simple Structured WorkflowModelFigure 3.The Graphical Representation of the Role-based Workflow Fragment ModelTable IT HE T EXTUAL R EPRESENTATION OF THE R OLE -BASED W ORKFLOW F RAGMENT M ODEL P RODUCED BY THE A LGORITHM=(ξ,ϑ,S ,E )over A ,R The Role-based Workflow Flagment ModelA ={αstart ,αA ,αB ,αC ,αD ,αE ,αF ,αend }ActivitiesR ={ηstart ,ηR −X ,ηR −Y ,ηR −Z ,ηend }Roles S =∅Initial Nodes E =∅Final Nodes ξ=ξi ∪ξoξi :Predecessors ξi (ηstart )=∅;ξi (ηR −X )={{ηstart },{ηR −Y },{ηR −Z }};ξi (ηR −Y )={{ηR −X },{ηR −Z }};ξi (ηR −Z )={{ηR −Y }};ξi (ηend )={{ηR −X },{ηR −Y },{ηR −Z }};ξo :Successorsξo (ηstart )={{ηR −X }};ξo (ηR −X )={{ηR −X },{ηend }};ξo (ηR −Y )={{{ηR −X },{ηR −Z }},{ηend }};ξo (ηR −Z )={{{ηR −X ,ηR −Y }},{ηend }};ξo (ηend )=∅;ϑ=ϑi ∪ϑoϑi :Fragmentsϑi (ηstart )={{αstart }};ϑi (ηR −X )={{αA },{αD },{αE }};ϑi (ηR −Y )={{αB },{αF }};ϑi (ηR −Z )={{αC }};ϑi (ηend )={{αend }};ϑo :NeighborFragments ϑo (ηstart )={{αA }};ϑo (ηR −X )={{αB },{αend }};ϑo (ηR −Y )={{{αC },{αD }},{αend }};ϑo (ηR −Z )={{{αE ,αF }},{αend }};ϑo (ηend )=∅;IV.R ELATED W ORKSThe fragmentation of workflows and process models is a very interesting and important research topic,which has been already addressed in variety of other works.As a typical related work,we would introduce the W.Tan &Y .Fan’s approach[2].They proposed a dynamic workflow fragmentation algorithm based on the well-known Petri net formalism unlike our approach,which tries to partition a centralized workflow model into fragments step by step while the workflow is executed,and the created fragmentscan be migrated to the proper workflow servers.The ap-proach also solve the scalability enhancing issue as well as the flexibility increasing issue.However,it is hard to say for the approach to have enough fragmentation criteria,because it transfers fragments by just judging their preconditions.In the web services and BPEL literature,there were also several tries for the workflow or process decomposition issues and the distributed enactment issues.R.Khalaf &F.Leymann[4]addressed a role-based decomposition mech-anism for BPEL-based business process model.Unlike ourapproach,their approach concerned about the process-based web service issue,and the primary goal was to disconnect the partitioning work from the design of the business process in order to just simplify the reassignment of activities to difference entities.Also,D.Martin[5]proposed an alterna-tive approach to enacting BPEL-based business processes’controlflow in a distributed,decentralized manner.However, unlike our approach,the approach was concerned about web service orchestration over decentralized worklow engines. Conclusively speaking,unlike those conventional ap-proaches proposed in the literature,our approach takes into account all of the workflow’s semantical components, such as roles,actors,and activity-dependencies or data-dependencies,to partition a workflow model into a series of fragments.V.C ONCLUSIONSThis paper proposed a workflow fragmentation framework consisting of the vertical,horizontal and hybrid approaches that can be applied into the very large scale workflow models and their enactment systems based upon the enterprise workflow grid architecture and computing environment.The approaches are based on the ICN-based structured workflow model and are implemented by a set of workflow fragmenta-tion technique,such as role-based fragmentation method and actor-based fragmentation method of the vertical fragmenta-tion approach,and controlpath-based fragmentation method of the horizontal fragmentation approach,and the hybrid approach.Finally,This paper showed that the approaches’algorithms are able to properly handle the workflow frag-mentation and distribution of a workflow model through an operational example with a simple ICN-based structured workflow model.In a consequence,according for the ad-vanced distributed enterprise computing environments like enterprise grid or enterprise cloud computing environments to be hot-issued in the near future,those very large scale distributed workflow enactment systems are rapidly growing and coping with a wide diversity of domains in terms of their applications and working environments.So,the literature needs various,advanced,and specialized workflow fragmen-tation techniques and architectures.We strongly believe that this work might be one of those impeccable attempts and pioneering contributions for improving and advancing the distributed workflow fragmentation technology.VI.A CKNOWLEDGMENTSThis research was supported by the National Research Foundation’s Basic Research Grant,No.2009-0075651,and this is the partial result of the collaborative works with the contents convergence software research center funded by the Gyeonggi Province,South Korea.R EFERENCES[1]P.Muth,et al,”From Centralized Workflow Specificationto Distributed Workflow Execution,”Journal of Intelligent Information Systems,V olume10,Number2,1998.[2]Wei Tan and Yushun Fan,”Dynamic workflow model frag-mentation for distributed execution,”Computers in Industry, V olume58,Number5,PP.381-391,June,2007.[3]J.Vanhatalo,H.V oelzer,and F.Leymann,”Faster andMore Focused Control-Flow Analysis for Business Process Models Through SESE Decomposition,”The Proceedings of ICSOC2007,LNCS,V olume4749,PP.43-55,Springer,2007.[4]Rania Khalaf and Frank Leymann,”Role-based Decomposi-tion of Business Processes using BPEL,”The Proceedings of International Conference on Web Services,2006.[5]Daniel Martin,et al,”A Novel Approach to DecentralizedWorkflow Enactment,”The IEEE Proceedings of International Conference on Enterprise Distributed Object Computing,Mu-nich,Germany,September,2008.[6]van der Aalst,W.M.P.,Barros,A.P.,ter Hofstede,A.H.M.and Kiepuszewski.B.,”Advanced Workflow Patterns,”The Proceedings of Conference on Cooperative Information Systems,LNCS,V olume19,2000.[7]Kwang-Hoon Kim and Clarence A.Ellis,”Workflow Reduc-tion for Reachable-path Rediscovery in Workflow Mining,”Series of Studies in Computational Intelligence:Foundations and Novel Approaches in Data Mining,V olume9,PP.289-310,2006.[8]Liu and A.Kumar,”An Analysis and Taxonomy of Un-structured Workflows,”Lecture Notes in Computer Science, V olume3649,PP.268-284,2005.[9]Kwang-Hoon Kim,”A Layered Workflow KnowledgeGrid/P2P Architecture and Its Models for Future Generation Workflow Systems,”Future Genration Computer Systems, V olume23,PP.304-316,2007.[10]Min-Jae Park and Kwang-Hoon Kim,”Control-path OrientedWorkflow Intelligence Analyses,”Journal of Information Sci-ence and Engineering,V olume24,Number2,PP.343-359, 2008.[11]Clarence A.Ellis,”Information Control Nets:A MathematicalModel of Information Flow,”ACM Proc.Conf.on Simulation, Modeling and Measurement of Computer Systems,PP.225-240,1979.[12]Kwanghoon Kim and Clarence A.Ellis,”Chapter VII.ICN-based Workflow Model and Its Advances,”Handbook of Research on Business Process Modeling,PP.142-172,In-formation Science Reference,2009.[13]Kwang-Hoon Kim,”Mining Workflow Processes from XML-based Distributed Workflow Event Logs,”IEEE Proceedings of International Workshop on Distributed XML Processing: Theory and Practice,Semtember2009.。